Solved

Finding spyware and hidden monitoring software

Posted on 2007-11-23
2
756 Views
Last Modified: 2013-11-18
We have a SBS 2003 that has very confidential information.

I did a McAfee Viruscan today and immediately received the Notification "The On-Demand Scan found alterations to code or data which may indicate that a rootkit is attempting to hide files, registry keys, processes or other items..."

It's the first time I've come across this and, although McAfee suggests a scan in safe mode, are there any good tools or ways using  McAfee Enterprise edition to determine if this is serious monitoring software and where it's coming from?

Thanks,

Mike
0
Comment
Question by:mikeabc27
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 2

Expert Comment

by:Dominik_L
ID: 20338845
There are many anti-rootkit utilities, but there is more probability that this is false alarm than it's really a rootkit.
You may try:
http://dobreprogramy.pl/index.php?dz=22&id=2181&t=55
http://dobreprogramy.pl/index.php?dz=22&id=1497&t=55

Try also online virus scanners like:
http://www.kaspersky.com/virusscanner
0
 
LVL 10

Accepted Solution

by:
yasserd earned 500 total points
ID: 20340792
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article was initially published on Monitis Blog, you can read it here . When it comes to deciding which approach to website performance monitoring is best for your business, unfortunately, like so many options in life . . . it depends. In th…
Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
Viewers will get an overview of the benefits and risks of using Bitcoin to accept payments. What Bitcoin is: Legality: Risks: Benefits: Which businesses are best suited?: Other things you should know: How to get started:
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question